Consul Provider Unable to Read Role that exists

I have a role that exists in all of my consul datacenters, that was created by terraform.

For some reason I’m getting a 403 ACL Not Found back from consul, which is usually a permissions issue, when it refreshes state and attempts to do a read on the role.

However, in the same shell, with the same environment variables, I can perform a consul acl role read -id=<ID From TF State> and it returns just fine with the role in question, so I’m not sure what’s getting lost in translation here.

TF_LOG=debug hasn’t really given me anything more verbose than that either:

2023-12-15T19:54:58.969Z [DEBUG] provider.terraform-provider-consul_v2.19.0_x4: 2023/12/15 19:54:58 [INFO] Consul Client configured with address: 'REDACTED:8501', scheme: 'https', datacenter: '', insecure_https: 'true'
2023-12-15T19:54:59.172Z [ERROR] vertex "consul_acl_role.management["REDACTED"]" error: failed to read role 'aabba91d-8ca1-380f-de55-a5948e45f1ea': Unexpected response code: 403 (rpc error making call: ACL not found)
2023-12-15T19:54:59.173Z [ERROR] vertex "consul_acl_role.management" error: failed to read role 'aabba91d-8ca1-380f-de55-a5948e45f1ea': Unexpected response code: 403 (rpc error making call: ACL not found)
2023-12-15T19:54:59.173Z [ERROR] vertex "consul_acl_role.management (expand)" error: failed to read role 'aabba91d-8ca1-380f-de55-a5948e45f1ea': Unexpected response code: 403 (rpc error making call: ACL not found)

but if I read that ID:

~ consul acl role read -id=aabba91d-8ca1-380f-de55-a5948e45f1ea                                                                                                                       

ID:           aabba91d-8ca1-380f-de55-a5948e45f1ea
Name:         REDACTED
Description:  Management role for REDACTED
Policies:
   8e2dd209-fc12-be0b-bf51-c4931db18bf0 - Management-Policy
   2a2a1d63-06d2-06f7-3862-ec2354e0d4e7 - Management-Policy

Anyone Seen this before?